Derui Wang

Orcid: 0000-0003-1388-7715

According to our database1, Derui Wang authored at least 29 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
LocGuard: A Location Privacy Defender for Image Sharing.
IEEE Trans. Dependable Secur. Comput., 2024

Query-Efficient Video Adversarial Attack with Stylized Logo.
CoRR, 2024

Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems.
CoRR, 2024

QUEEN: Query Unlearning against Model Extraction.
CoRR, 2024

Provably Unlearnable Examples.
CoRR, 2024

LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model.
Proceedings of the IEEE Security and Privacy, 2024

Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer.
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024

Mitigating Unauthorized Speech Synthesis for Voice Protection.
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024

Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Optimizing Cyber Defense in Dynamic Active Directories Through Reinforcement Learning.
Proceedings of the Computer Security - ESORICS 2024, 2024

LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Reinforcement Unlearning.
CoRR, 2023

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding.
CoRR, 2023

StyleFool: Fooling Video Classification Systems via Style Transfer.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Flow-Attention-based Spatio-Temporal Aggregation Network for 3D Mask Detection.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
On the Neural Backdoor of Federated Generative Models in Edge Computing.
ACM Trans. Internet Techn., 2022

Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training.
IEEE Trans. Dependable Secur. Comput., 2022

Backdoor Attack on Machine Learning Based Android Malware Detectors.
IEEE Trans. Dependable Secur. Comput., 2022

Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022

Competitive Forward and Spot Trading Under Yield Uncertainty.
Found. Trends Technol. Inf. Oper. Manag., 2022

Visual Subtitle Feature Enhanced Video Outline Generation.
CoRR, 2022

KGEA: A Knowledge Graph Enhanced Article Quality Identification Dataset.
CoRR, 2022

2021
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
IEEE Trans. Inf. Forensics Secur., 2020

2019
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.
CoRR, 2019

Flight Schedule Recovery: A Simulation-Based Approach.
Asia Pac. J. Oper. Res., 2019

STRIP: a defence against trojan attacks on deep neural networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2015
Explore the hidden treasure in protein-protein interaction networks - An iterative model for predicting protein functions.
J. Bioinform. Comput. Biol., 2015


  Loading...